¡Activa las notificaciones laborales por email!

Security Operations Center Analyst

Trigyn Technologies

Vitoria

A distancia

EUR 50.000 - 70.000

Jornada completa

Hoy
Sé de los primeros/as/es en solicitar esta vacante

Genera un currículum adaptado en cuestión de minutos

Consigue la entrevista y gana más. Más información

Descripción de la vacante

A technology services provider is seeking a Security Operations Analyst to provide cyber security support. This remote role involves monitoring alerts, conducting security log analysis, and assisting in incident response efforts. Candidates should have at least 5 years of experience with various security tools and a strong command of English.

Formación

  • Minimum of five (5) years of relevant experience in IT security.
  • Proven experience with security tools and incident response.
  • Ability to perform security log analysis.

Responsabilidades

  • Monitor and investigate alerts using Microsoft Security Tools.
  • Analyze network and host-based security logs.
  • Assist with incident response and mitigation efforts.

Conocimientos

Knowledge of TCP/IP protocols
Knowledge of Microsoft Security Tools
Knowledge of Cloud technologies
Knowledge of SIEM tools
Knowledge of EDR solutions
Knowledge of email security and incident response
Knowledge of Linux/Mac/Windows
Proficient in English

Herramientas

SIEMs
EDRs
Descripción del empleo

Trigyn has a contractual opportunity for a Security Operations Analyst. This resource will be working Remotely.

Job Description

The incumbent will work under the supervision and guidance of the Head of Cyber Security Operations to provide front-line support to client Partners in the area of information / cyber security, risk management consulting, and security operations activities in collaboration with a team of information and cybersecurity experts.

The resource will be part of the 24x7 Security Operations Centre (CSOC) and will work in close collaboration with team members distributed around the globe to monitor, detect, triage, investigate and respond to cyber threats targeting its Clients and Partner Organizations.

Scope of Work / Duties of Consultant
  • Monitor and investigate alerts leveraging Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoint, Azure Security, Azure Sentinel and XDR)
  • Monitor and triage AWS security events and detections
  • Monitor and investigate alerts leveraging EDR and NDR solutions
  • Review security events that are populated in a Security Information and Event Management (SIEM) system
  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident
  • Identify the incident root cause and take proactive mitigation steps
  • Assist with incident response efforts
  • Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, alerts, etc.
  • Integrate and share information with other analysts and other teams
  • Determine and direct remediation and recovery efforts.
  • Provide other ad hoc support as required
Required Technical Skills
  • Knowledge of Transmission Control Protocol / Internet Protocol (TCP / IP) protocols
  • Deep knowledge of Microsoft Security Tools (e.g. M365, Cloud App Security, Azure, Defender for Endpoint, Azure Security, Azure Sentinel and XDR)
  • Deep knowledge of Cloud technologies (e.g. Azure, AWS and GCP)
  • Deep knowledge of SIEM tools like Splunk, QRadar, ArcSight, MS Sentinel, ELK Stack
  • Knowledge of at least one EDR solution (MS Defender for Endpoint, SentinelOne, CrowdStrike)
  • Knowledge of email security, network monitoring, and incident response
  • Knowledge of Linux / Mac / Windows
  • A minimum of five (5) years of relevant experience in the information technology field, including triage of alerts and supporting security incidents
  • Proven experience with the usual toolbox available in a SOC (e.g., SIEMs, EDRs), able to autonomously perform technical analysis of security threats and collaborate with the Incident Response team
  • Trouble ticket generation and processing experienceExtensive Windows, Linux, Database, Application, Web server, etc. log analysis
  • Expert knowledge of English, both written and spoken, is required
The resource SHOULD have the following skills and experience
  • Experience on an Incident Response team performing Tier I / II initial incident triage.
  • Proven knowledge of monitoring AWS environment (IaaS, Saas, Paas)
  • Knowledge of at least one general-purpose or shell scripting language (e.g. Ruby, Bash, PowerShell, Python, etc.)
Required Soft Skills
  • Excellent communication skills
  • Customer-facing experience and oral communication skills
Ability to write documentation & reports
  • Creativity / ability to find innovative solutions
  • Willingness to learn on the job
  • Conflict management & cooperation
Desirable certifications
  • Technical certifications: MCSE, CCNA, Microsoft Azure (e.g., SC-200), GCIH, CEH, GCFA or any GIAC / similar certification
  • Relevant industry certifications
Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.